网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which remote access VPN addressing technique supports a static IP address to support a specific application?()
A
Use a static ip addresses based on incoming user policies.
B
Use DHCP to assign addresses based on incoming user policies.
C
Deploy a clientless model to assign a unique address to the user.
D
Deploy RADIUS or LDAP to assign the address to the user.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which remote access VPN addressing technique supports a static IP address to support a specific application?()A Use a static ip addresses based on incoming user policies.B Use DHCP to assign addresses based on incoming user policies.C Deploy a clientless model to assign a unique address to the user.D Deploy RADIUS or LDAP to assign the address to the user.” 相关考题
考题
A route-based VPN is required for which scenario? ()
A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN
考题
Which two of these are advantages of placing the VPN device parallel to the firewall?()
A. high scalabilityB. the design supports a layered security modelC. firewall addressing does not need to changeD. IPsec decrypted traffic is inspected by the firewallE. there is a centralized point for logging and content inspection
考题
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
考题
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
考题
In JUNOS software, which type of VPN supports IPX and Appletalk?()A、Martini based VPN’sB、2547bis based VPN’sC、Sham link based VPN’sD、Virtual Router based VPN’s
考题
You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A、HTTPB、LDAPC、POP3D、SMTPE、VPN Gateway
考题
Which three attributes are advertised to the remote PE and BGP-based VPNs?()A、Circuit IDB、VPN labelC、Route targetD、VPN numberE、Route distinguisher
考题
Which of the following topology situations would be a qood candidate for configuring DMVPN()A、Extranet VPNB、Managed overlay VPN topologyC、Hub-and-spoke VPN topologyD、Central-site VPN topologyE、Full mesh VPN topologyF、Remote-access VPN topology
考题
Which two of these are advantages of placing the VPN device parallel to the firewall?()A、 high scalabilityB、 the design supports a layered security modelC、 firewall addressing does not need to changeD、 IPsec decrypted traffic is inspected by the firewallE、 there is a centralized point for logging and content inspection
考题
What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet
考题
Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN
考题
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
Your network consists of a single Active Directory domain. The remote access permission for all users is set to Control access through Remote Access Policy.You have a VPN server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). The current configuration allows all authenticated users to establish VPN connections to Server1. You create a global group named Group1.You need to prevent all members of Group1 from establishing VPN connections to Server1. What should you do?()A、From the local computer policy on Server1, modify the Account Policies settings.B、From Active Directory Users and Computers, modify the Security settings of Group1.C、From the Routing and Remote Access snap-in, create a new remote access policy.D、From the Routing and Remote Access snap-in, open the properties of Server1 and modify the security options.
考题
You are designing a strategy to provide Internet access to all users. What should you do?()A、 Configure Internet Connection Sharing on all client computers.B、 Configure Automatic Private IP Addressing (APIPA) on all client computers.C、 Configure one server as a Routing and Remote Access VPN server.D、 Configure one server as a Routing and Remote Access NAT router.
考题
单选题You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()A
Configure each server running Routing and Remote Access as a RADIUS Client.B
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
考题
单选题You are designing a strategy to provide Internet access to all users. What should you do?()A
Configure Internet Connection Sharing on all client computers.B
Configure Automatic Private IP Addressing (APIPA) on all client computers.C
Configure one server as a Routing and Remote Access VPN server.D
Configure one server as a Routing and Remote Access NAT router.
考题
单选题Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access. What should you do?()A
Allow dial-in access for the user accounts of all Sales group members. B
Deny dial-in access for the user accounts of all users except the Sales group members. C
Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group. D
Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.
考题
单选题A route-based VPN is required for which scenario? ()A
when the remote VPN peer is behind a NAT deviceB
when multiple networks need to be reached across the tunnelC
when the remote VPN peer is a dialup or remote access clientD
when a dynamic routing protocol such as OSPF is required across the VPN
考题
单选题A policy-based IPsec VPN is ideal for which scenario?()A
when you want to conserve tunnel resourcesB
when the remote peer is a dialup or remote access clientC
when you want to configure a tunnel policy with an action of denyD
when a dynamic routing protocol such as OSPF must be sent across the VPN
考题
单选题Which remote access VPN addressing technique supports a static IP address to support a specific application?()A
Use a staticip addresses based on incoming user policies.B
Use DHCP to assign addresses based on incoming user policies.C
Deploy a clientless model to assign a unique address to the user.D
Deploy RADIUS or LDAP to assign the address to the user.
考题
单选题What is the benefit of using the Cisco Easy VPN Server feature along with the Cisco software VPN client for implementing remote-access VPNs? ()A
The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.B
The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.C
The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.D
The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.
考题
单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A
It is recommended to place the VPN termination device in line with the Enterprise Edge 1B
Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC
VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD
Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
考题
多选题Which two of these are advantages of placing the VPN device parallel to the firewall?()Ahigh scalabilityBthe design supports a layered security modelCfirewall addressing does not need to changeDIPsec decrypted traffic is inspected by the firewallEthere is a centralized point for logging and content inspection
考题
单选题You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()A
HTTPB
LDAPC
POP3D
SMTPE
VPN Gateway
考题
单选题In JUNOS software, which type of VPN supports IPX and Appletalk?()A
Martini based VPN’sB
2547bis based VPN’sC
Sham link based VPN’sD
Virtual Router based VPN’s
考题
单选题You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()A
Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clientsB
Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clientsC
Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connectionD
Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connection
热门标签
最新试卷